Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-6308 PoC — SAP 多款产品代码问题漏洞

Source
Associated Vulnerability
Title:SAP 多款产品代码问题漏洞 (CVE-2020-6308)
Description:SAP BusinessObjects Business Intelligence Platform是德国思爱普(SAP)公司的一套商务智能软件和企业绩效解决方案套件。该产品具有报告生成、分析、数据可视化等功能。 SAP 存在安全漏洞,目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Description
This script exploits and performs an SSRF (Server-Side Request Forgery) and Timing Attack against the SAP BusinessObjects Launchpad (CVE-2020-6308). It attempts to determine the status of various ports on a target IP address by measuring the response time of the application when attempting to authenticate against it.
Readme
# SAP BusinessObjects Launchpad SSRF & Timing Attack PoC

This Python script is a proof-of-concept (PoC) for executing SSRF (Server-Side Request Forgery) and Timing Attacks against SAP BusinessObjects Launchpad. It is designed to help security researchers and professionals identify open ports on a target IP by leveraging SAP BusinessObjects' authentication mechanisms.

## Features

- **SSRF Exploit:** Leverages SSRF to interact with internal services by targeting different ports on a specified IP address.
- **Timing Attack:** Measures the time taken by the SAP BusinessObjects server to respond to authentication attempts, allowing you to infer the status of targeted ports.
- **Customizable Ports:** Allows you to specify a list of ports to target, or you can use the default set of common ports.

## Requirements

- Python 3.x

## Installation

Clone the repository and navigate to the project directory:

```bash
git clone https://github.com/MachadoOtto/sap_bo_launchpad-ssrf-timing_attack.git
cd sap_bo_launchpad-ssrf-timing_attack
```

## Usage

```bash
./sap_bo_launchpad-ssrf-timing_attack.py <affected_url> <targetIP> [targetPorts]
```

- `affected_url`: The URL of the SAP BusinessObjects Launchpad instance you want to test.
- `targetIP`: The IP address you want to probe for open ports.
- `targetPorts` (optional): A comma-separated list of ports to check (e.g., 22,80,443). If not specified, a default set of ports will be used.

##  Legal Disclaimer

This script is intended for educational purposes only and should only be used in environments where you have explicit permission to conduct security testing. Unauthorized use of this script against targets without consent is illegal and unethical.
File Snapshot

[4.0K] /data/pocs/fe91281dd060e26cf17906a90ba815eb4c5569f1 ├── [1.0K] LICENSE ├── [1.7K] README.md └── [2.5K] sap_bo_launchpad-ssrf-timing_attack.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.